Showing 3,941 - 3,960 results of 209,172 for search 'effective (method OR methods)', query time: 0.79s Refine Results
  1. 3941

    Synthesis of Wollastonite Powders by Combustion Method: Role of Amount of Fuel by Imarally V. de S. R. Nascimento, Willams T. Barbosa, Raúl G. Carrodeguas, Marcus V. L. Fook, Miguel A. Rodríguez

    Published 2018-01-01
    “…The objective of this work has been the synthesis of wollastonite by solution combustion method. The novelty of this work has been obtaining the crystalline phase without the need of thermal treatments after the synthesis. …”
    Get full text
    Article
  2. 3942

    Homogeneity enhancement of oxide additives in boron carbide by precipitation method by Toksoy Muhammet Fatih, Elçi Caner

    Published 2025-03-01
    “…The additive-to-boron carbide ratio and calcination conditions were systematically varied and the resulting powders were characterized using SEM, EDX and zeta potential analyses. The precipitation method effectively improved additive dispersion, achieving a uniform distribution. …”
    Get full text
    Article
  3. 3943

    Dimensioness method of assessing the conditions of thermal shock to the reactor vessel by V. I. Skalozubov, T. V. Gablaia, I. L. Kozlov, E. S. Leshotnaya

    Published 2014-03-01
    “…The dimensionless method is developed concerning the rating conditions of the thermal shock to reactor vessels. …”
    Get full text
    Article
  4. 3944

    Local Outlier Detection Method Based on Improved K-means by Yu ZHOU, Hao XIA, Xuezhen YUE, Peichong WANG

    Published 2024-07-01
    “…The challenge lies in accurately determining the cutoff distance <italic>d</italic><sub>c</sub>, making it difficult to precisely identify the number of cluster centers from the decision graph obtained using a single <italic>d</italic><sub>c </sub>value. The elbow method is employed to determine the optimal number of clusters for an unknown dataset for the best clustering effectiveness to address the challenge of determining the number of clusters. …”
    Get full text
    Article
  5. 3945

    A verification method for DMA controller based on AHB bus by Luo Yiniu, Ma Bingchang

    Published 2025-01-01
    “…To demonstrate the effectiveness of the method, the architecture of the DMA controller UVM verification platform was modified and optimized, and the platform was reused to construct the Image2D controller UVM verification platform. …”
    Get full text
    Article
  6. 3946

    STRUCTURAL RELIABILITY ANALYSIS BASED ON AN IMPROVEMENT OF THE RESPONSE SURFACE METHOD by ZHANG XueGang

    Published 2018-01-01
    “…Then the sample points near the failure boundary from all sample points were selected after convergence, the limit state function was built by a quadratic polynomial response surface with mixed terms and square terms, and finally the structural reliability was calculated by the Monte Carlo method. Numerical examples show that the response function is able to approximate the real failure curve, and effectively improves the reliability calculation accuracy, using mixed response surface method during iterations sample points are reduced, in other words computing time in engineering are decreased.…”
    Get full text
    Article
  7. 3947

    LDoS attack detection method based on simple statistical features by Xueyuan DUAN, Yu FU, Kun WANG, Bin LI

    Published 2022-11-01
    “…Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the demand for LDoS attack detection in a real network environment.By studying the principle of LDoS attack and analyzing the features of LDoS attack traffic, a detection method of LDoS attack based on simple statistical features of network traffic was proposed.By using the simple statistical features of network traffic packets, the detection data sequence was constructed, the time correlation features of input samples were extracted by deep learning technology, and the LDoS attack judgment was made according to the difference between the reconstructed sequence and the original input sequence.Experimental results show that the proposed method can effectively detect the LDoS attack traffic in traffic and has strong adaptability to heterogeneous network traffic.…”
    Get full text
    Article
  8. 3948

    Evolution of Aerosol Particles in the Rainfall Process via Method of Moments by Fangyang Yuan, Fujun Gan

    Published 2013-01-01
    “…The method of moments is employed to predict the evolution of aerosol particles in the rainfall process. …”
    Get full text
    Article
  9. 3949

    Research on lightweight malware classification method based on image domain by SUN Jingzhang, CHENG Yinan, ZOU Binghui, QIAO Tonghua, FU Sizheng, ZHANG Qi, CAO Chunjie

    Published 2025-03-01
    “…To address the high deployment costs and long prediction times associated with traditional malware classification methods, a lightweight malware visualization classification method was proposed. …”
    Get full text
    Article
  10. 3950

    A New Method of 3D Facial Expression Animation by Shuo Sun, Chunbao Ge

    Published 2014-01-01
    “…Secondly, through using the method of principle component analysis (PCA), we generate the parameter sets of eigen-ERI space, which will rebuild reasonable expression ratio image. …”
    Get full text
    Article
  11. 3951

    Research on 5G MEC security assessment system and method by Qiucheng LU, Jinhui TANG, Congying BAO, Hao WU, Yusun FU

    Published 2023-08-01
    “…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
    Get full text
    Article
  12. 3952

    Construction method and application of domain knowledge graph for command and guidance by GONG Bowen

    Published 2025-08-01
    “…The article summarizes the domain knowledge system for experimental command and guidance requirements, and proposes a domain knowledge graph construction method based on command and guidance data. Using the experience and knowledge of experts, a knowledge system for equipment testing command and adjustment was constructed as the initial ontology of the knowledge graph in this field. …”
    Get full text
    Article
  13. 3953
  14. 3954

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  15. 3955
  16. 3956

    Non-destructive method for extracting DNA from cowpea seeds by Victoria de Oliveira Santos, Eveline Nogueira Lima, Ingrid Bernardo de Lima Coutinho, Cândida Hermínia Campos de Magalhães, Patricia do Nascimento Bordallo

    Published 2025-08-01
    “…Three DNA extraction protocols were evaluated to determine the most suitable non-destructive method: the CTAB method, the NaOH-Tris method and a commercial kit. …”
    Get full text
    Article
  17. 3957

    Landscape Fusion Method Based on Augmented Reality and Multiview Reconstruction by Genlong Song, Yi Li, Lu-Ming Zhang

    Published 2022-01-01
    “…At the same time, for the difficulties of 3D model reconstruction requiring relevant expertise and the defects of poor reconstruction effect, the SFM algorithm is used for multiview reconstruction of landscape models to realize the augmented reality fusion method of natural scenes and landscape models. …”
    Get full text
    Article
  18. 3958
  19. 3959

    Research on Schedule Management Method Based on Critical Chain Technology by MA Di, GUAN Xiaodi, WANG Wenjin, WEI Huanhuan, ZHU Yongfeng

    Published 2022-01-01
    “…Critical chain technology is a new method of project schedule management.In recent years,scholars at home and abroad have increasingly studied this technology.The research on critical chain technology mainly focuses on solving the problems of inter-project operation slack and construction delay caused by unreasonable buffer setting.In this paper,the information entropy theory is employed to build a new buffer setting model that comprehensively considers overall complexity entropy,individual complexity entropy,construction difficulty entropy,resource constraint entropy,and decision-maker preference factor.The root variance method is adopted to improve the buffer calculation formula.Then,the redundant buffer is integrated into the project buffer,and the buffer setting model is modified by absorbing possible risks.Finally,an example is discussed to verify the practicability of the model.The research shows that the proposed model can quantify the impact of risk factors on project schedule more reasonably and comprehensively,improve the accuracy of buffer setting,and effectively solve the series of problems caused by excessive import buffer.…”
    Get full text
    Article
  20. 3960

    Genetic Algorithm-Based Method for Discovering Involutory MDS Matrices by El Mehdi Bellfkih, Said Nouh, Imrane Chems Eddine Idrissi, Khalid Louartiti, Jamal Mouline

    Published 2023-01-01
    “…Through comprehensive experiments, we demonstrate the effectiveness of our method and also unveil essential insights into automorphism groups within MDS self-dual codes. …”
    Get full text
    Article